Mageia 2020-0373: libproxy security update | LinuxSecurity.com
MGASA-2020-0373 - Updated libproxy packages fix security vulnerability

Publication date: 27 Sep 2020
URL: https://advisories.mageia.org/MGASA-2020-0373.html
Type: security
Affected Mageia releases: 7
CVE: CVE-2020-25219

url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote
HTTP server to trigger uncontrolled recursion via a response composed of an
infinite stream that lacks a newline character. This leads to stack
exhaustion. (CVE-2020-25219)

References:
- https://bugs.mageia.org/show_bug.cgi?id=27302
- https://www.debian.org/lts/security/2020/dla-2372
- https://ubuntu.com/security/notices/USN-4514-1
- https://lists.fedoraproject.org/archives/list/[email protected]/thread/CNID6EZVOVH7EZB7KFU2EON54CFDIVUR/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25219

SRPMS:
- 7/core/libproxy-0.4.15-4.1.mga7

Mageia 2020-0373: libproxy security update

url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a n...

Summary

url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion. (CVE-2020-25219)

References

- https://bugs.mageia.org/show_bug.cgi?id=27302

- https://www.debian.org/lts/security/2020/dla-2372

- https://ubuntu.com/security/notices/USN-4514-1

- https://lists.fedoraproject.org/archives/list/[email protected]/thread/CNID6EZVOVH7EZB7KFU2EON54CFDIVUR/

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25219

Resolution

MGASA-2020-0373 - Updated libproxy packages fix security vulnerability

SRPMS

- 7/core/libproxy-0.4.15-4.1.mga7

Severity
Publication date: 27 Sep 2020
URL: https://advisories.mageia.org/MGASA-2020-0373.html
Type: security
CVE: CVE-2020-25219

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.